digitalcuration
14.4K views | +4 today
Follow
 
Scooped by Stéphane Koch
onto digitalcuration
Scoop.it!

Ten Steps to Smartphone Security for Android

Ten Steps to Smartphone Security for Android | digitalcuration | Scoop.it

Smartphones continue to grow in popularity and are now as powerful and functional as many computers. It is important to protect your smartphone just like you protect your computer as mobile cybersecurity threats are growing. Mobile security tips can help you reduce the risk of exposure to mobile security threats.

 

more...
No comment yet.
digitalcuration
société de l'information, identité & comportements numériques, sécurité de l'information, réseaux & médias sociaux
Curated by Stéphane Koch
Your new post is loading...
Your new post is loading...
Scooped by Stéphane Koch
Scoop.it!

Attentats: pourquoi je ne partage plus mon émotion sur les réseaux sociaux

Attentats: pourquoi je ne partage plus mon émotion sur les réseaux sociaux | digitalcuration | Scoop.it
On pourrait considérer la diffusion des images et d'autres éléments émotionnellement impactants, comme la « seconde » déflagration de l'attentat. La stratégie des terroristes vise aussi à utiliser l’onde de choc physique et émotionnelle de l'attentat pour initier de multiples «répliques » de cette première onde de choc, respectivement "résonance émotionnelle". Les réseaux sociaux, et les chaines d'information en continu, en seront les principaux catalyseurs (propagation de l'onde de choc de l'acte – ou des actes – terroriste de base).

L'amplification de l'impact: par le partage des images et vidéos des scènes des attentats, de celles des victimes, des témoignages de leur douleur, de sa propre douleur... on "étend" virtuellement le périmètre physique, l'impact des explosions, les dommages humains qu'elles ont causés, à chaque personne que l'on va “toucher” par nos diffusions. Les contenus partagés sont à prendre comme autant d’éclats de cette déflagration/explosion émotionnelle. Ils vont affecter et blesser notre psychisme durablement (le traumatisme se créer aussi par le partage d’expériences traumatisantes). Ce qui est exactement ce que les initiateurs de ces attentats cherchent à faire. Ils ne partagent pas nos valeurs, il s’en servent… dès lors, il est important de le prendre en compte pour renforcer notre résilience.

Le fait que je n'affiche pas mon émotion ne signifie pas que je n'éprouve pas d'émotion. Ça ne signifie pas non plus que je n'éprouve pas d'empathie pour les victimes et leurs proches. A titre personnel, je le souligne, je ne veux pas courir le risque que mon empathie ou ma colère… puisse servir d'élément de motivation ou de validation à ceux qui sont à l'origine de tels actes, et que par rebond, je puisse causer insidieusement et indirectement d'autres victimes. Je te le dis sans certitude, ni animosité, ni arrogance, ni leçon de morale.

Je ne veux pas non plus alimenter une « stratégie de la tension » dont certains gouvernements vont se servir (se serve) pour alimenter leur propre agenda politique. Ni à aider à justifier la mise en place d’un « tout sécuritaire » et d’une restriction de nos libertés - au nom de nos libertés - qui ne serait qu’un nuage de fumée destiné à masquer les manquements des services de renseignements et de leur incapacité à collaborer correctement les uns avec les autres.

Pour finir, je ne partage que des informations que je considère comme potentiellement "utiles" (avec toute la portée subjective de mon jugement), si c’est le moment, ou encore le moment de les partager, et sur quelles plateformes les partager (informations sur le don du sang, les numéros d’urgence, les appels à témoins, par exemple).
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

1 proche sur 5 a déjà espionné votre Facebook, dit une étude

1 proche sur 5 a déjà espionné votre Facebook, dit une étude | digitalcuration | Scoop.it
Les utilisateurs des réseaux sociaux sont nombreux à craindre d'être piratés, mais d'après les conclusions d'une étude de l'Université de la Colombie-Britannique (UBC), il y a de plus grandes chances d'être espionné par un proche. Plus d’un internaute adulte sur quatre (24 %) s’est déjà immiscé dans le compte Facebook d’un ami, d’un partenaire ou d’un membre de la famille en utilisant l’ordinateur ou le téléphone cellulaire de la victime, révèle l’étude financée par le Commissariat à la protection de la vie privée du Canada et réalisée en partenariat avec des chercheurs de l’Université de Lisbonne. « Il s’agit clairement d’une pratique répandue. Les messages privés de Facebook, les photos ou les vidéos sont des cibles lorsque le propriétaire du compte est automatiquement enregistré et que l’ordinateur ou le téléphone cellulaire est à portée de main », commente Wali Ahmed Usmani, l’auteur principal de l’étude.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Journalism That Stands Apart

Journalism That Stands Apart | digitalcuration | Scoop.it
The report of the The New York Times’s 2020 group, on the future of the newsroom. This is a vital moment in the life of The New York Times. Journalists across the organization are hungry to make change a reality, and we have new leaders ready to push us forward. Most important, The Times is uniquely well positioned to take advantage of today’s changing media landscape — but also vulnerable to decline if we do not transform ourselves quickly
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Key Transparency: A secure directory of public encryption keys - Help Net Security

Key Transparency: A secure directory of public encryption keys - Help Net Security | digitalcuration | Scoop.it
Google has released Key Transparency, an open-source public directory meant to simplify the discovery of intended recipients' public encryption key.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Remembering Zygmunt Bauman: Social Media, Sorcery, and Pleasurable Traps - Cyborgology

Remembering Zygmunt Bauman: Social Media, Sorcery, and Pleasurable Traps - Cyborgology | digitalcuration | Scoop.it
The Society Pages (TSP) is an open-access social science project headquartered in the Department of Sociology at the University of Minnesota Earlier this week, I posted a remembrance of the ways Zygmunt Bauman influenced us here at Cyborgology. In this post, I reflect on–and attempt to further develop–some of the aspects of Bauman’s thought that may be useful to us as we continue our work theorizing digital media. Two things I most admired about Zygmunt Bauman were his ability to relate his theories to current events (even as he aged into his 90s) and the way he always manage to connect social theory and moral philosophy–how to achieve justice as a society and lead a good life as an individual. To the former point, Bauman was remarkably prolific up until his final days. In a 2016 interview that sets the tone for my reflection here, he argued: most people use social media not to unite, not to open their horizons wider, but on the contrary, to cut themselves a comfort zone where the only sounds they hear are the echoes of their own voice, where the only things they see are the reflections of their own face. Social media are very useful, they provide pleasure, but they are a trap. This notion of social media as a pleasurable trap–and how Bauman comes to understand it this way–is the lens through which I would like to review his sizable body of work.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Open Whisper Systems >> Blog >> There is no WhatsApp 'backdoor'

Open Whisper Systems >> Blog >> There is no WhatsApp 'backdoor' | digitalcuration | Scoop.it
Stéphane Koch's insight:
One fact of life in real world cryptography is that these keys will change under normal circumstances. Every time someone gets a new device, or even just reinstalls the app, their identity key pair will change. This is something any public key cryptography system has to deal with. WhatsApp gives users the option to be notified when those changes occur. While it is likely that not every WhatsApp user verifies safety numbers or safety number changes, the WhatsApp clients have been carefully designed so that the WhatsApp server has no knowledge of whether users have enabled the change notifications, or whether users have verified safety numbers. WhatsApp could try to "man in the middle" a conversation, just like with any encrypted communication system, but they would risk getting caught by users who verify keys.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Facebook Pages can now “go live” from the desktop, add live contributors and more

Facebook Pages can now “go live” from the desktop, add live contributors and more | digitalcuration | Scoop.it
Facebook Live, the social network’s live video streaming platform, received a series of updates this week, the most notable being the ability for broadcasters to “go live” from th…
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Brazilian Government Tweets Passwords to All of Its Social Media Accounts

Brazilian Government Tweets Passwords to All of Its Social Media Accounts | digitalcuration | Scoop.it
Brazilian President Michel Temer’ administration became the laughing stock of the country’s Internet users after the passwords for its social media accounts were accidentally leaked to the public.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Wide Impact: Highly Effective Gmail Phishing Technique Being Exploited

Wide Impact: Highly Effective Gmail Phishing Technique Being Exploited | digitalcuration | Scoop.it
A new phishing technique that affects GMail and other services and how to protect yourself. As you know, at Wordfence we occasionally send out alerts about security issues outside of the WordPress universe that are urgent and have a wide impact on our customers and readers. Unfortunately this is one of those alerts. There is a highly effective phishing technique stealing login credentials that is having a wide impact, even on experienced technical users. I have written this post to be as easy to read and understand as possible. I deliberately left out technical details and focused on what you need to know to protect yourself against this phishing attack and other attacks like it in the hope of getting the word out, particularly among less technical users. Please share this once you have read it to help create awareness and protect the community. The Phishing Attack: What you need to know A new highly effective phishing technique targeting Gmail and other services has been gaining popularity during the past year among attackers. Over the past few weeks there have been reports of experienced technical users being hit by this. This attack is currently being used to target Gmail customers and is also targeting other services. The way the attack works is that an attacker will send an email to your Gmail account. That email may come from someone you know who has had their account hacked using this technique. It may also include something that looks like an image of an attachment you recognize from the sender
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Mean Mummies: The double-edged sword of Facebook parents' groups

Mean Mummies: The double-edged sword of Facebook parents' groups | digitalcuration | Scoop.it
In another era, suburban mums would chat to each other over the back fence sharing the trials and tribulations of parenthood. But those days are long gone, with many couples working full time, living far afield from friends and family and only on nodding terms with the neighbours. Social media pages for parents have sprung up to fill the void and while Facebook exchanges can be a source of useful information, support and entertainment, they can also turn nasty surprisingly quickly when posts go rogue. Emma Lovell, a businesswoman and mother-of-two from Queenscliff, was stunned by the level of aggression she witnessed in groups supposedly established to offer support. "I would see the most hurtful comments on Facebook every day," she says. "Women would say things to each other online they wouldn't dream of saying in a face to face conversation. They just vent." Lovell became so disenchanted with the cyber hate she witnessed, she recently set up her own Facebook group, Mumsomnia, with the aim of encouraging women to meet face to face. RMIT University information technology lecturer John Lenarcic​ says social media can be a double edged-sword, providing great support but also fertile ground for bullying
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

User-Submitted Malware: A Safety Guide for Journalists

User-Submitted Malware: A Safety Guide for Journalists | digitalcuration | Scoop.it
When journalists ask readers to share newsworthy images, videos, audio, or documents, they increase their own vulnerability to attack. And if editors publish those files unaltered, they risk…
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Marilou abandonne partiellement les réseaux sociaux - Showbizz.net

Marilou abandonne partiellement les réseaux sociaux - Showbizz.net | digitalcuration | Scoop.it
La jeune entrepreneure a décidé de laisser tomber ses comptes Twitter et Snapchat. « (…) C’est en m’inspirant de tout le positif qu’apporte les médias sociaux dans ma vie que j’ai décidé d’épurer mes publications et de limiter ma présence en me dédiant qu’à deux plateformes et en éliminant les autres », a écrit Marilou sur Facebook au lendemain du Jour de l’an. La chanteuse et femme d’affaires précise qu’elle n’utilisera plus ses comptes Twitter et Snapchat afin de se concentrer sur les plateformes Facebook et Instagram. « Je vais essayer de mieux le faire en coupant dans le gras (lawlz) et en me limitant à ce que je trouve pertinent et inspirant seulement. J’ai manqué quelques occasions de le faire l’an dernier et je suis très optimiste que de me mettre un cadre me poussera à être davantage créative et inspirée à travers les prochains mois », mentionne-t-elle. « Au fond, je serai, en quelque sorte, beaucoup plus « présente » », conclut-elle.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Hashtags: How They Differ On Each Social Network

Hashtags: How They Differ On Each Social Network | digitalcuration | Scoop.it
Learn What Hashtags Mean On Each Social Network Twitter may have been the first social sharing site to use hashtags to increase visibility — other networks like Facebook, Instagram and Google Plus… Hashtags are great for researching your market and connecting with others — when you see a hashtag in a tweet and want to see what others are saying about that subject, all you have to do is click on the hashtag and you will get a list of tweets and people that use that word. If you would like to improve your reach on social media you will need to know the nuances of how the hashtag is used on the different networks, and how to best leverage them
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

« Comment enseigner les méthodes d’analyse du renseignement »

« Comment enseigner les méthodes d’analyse du renseignement » | digitalcuration | Scoop.it
Pierre Memheld, Université de Strasbourg L’analyse du renseignement est avant tout un ensemble de méthodes, et de connaissances, avant d’être des outils. L’évolution des moyens de communication, de commandement ou de collection entraîner une explosion des volumes d’informations à traiter ou des environnements logiciels à maîtriser. De la méthode et des méthodes Connaître les méthodes…
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

holoportation: virtual 3D teleportation in real-time (Microsoft Research)

holoportation: virtual 3D teleportation in real-time (Microsoft Research) | digitalcuration | Scoop.it
holoportation is a new type of 3D capture technology that allows high quality 3D models of people to be reconstructed, compressed, and transmitted anywher
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Les formations officielles pour maîtriser Facebook, Twitter et Google - Blog du Modérateur

Les formations officielles pour maîtriser Facebook, Twitter et Google - Blog du Modérateur | digitalcuration | Scoop.it
Pour se former spécifiquement à un service comme Facebook, Twitter ou Google, on peut profiter des formations en ligne proposées gratuitement par ces outil
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

WhatsApp vulnerability explained: by the man who discovered it | Tobias Boelter

WhatsApp vulnerability explained: by the man who discovered it | Tobias Boelter | digitalcuration | Scoop.it
In a simplified manner, encrypted messaging works using secret and public keys. Every user has both a secret key known only to them, and a public key. A user’s public key can be used to encrypt messages which can then only be made readable again with the associated secret key. A difficult problem in secure communication is getting your friend’s public keys. Apps such as WhatsApp and Signal make the process of getting those keys easy for you by storing them on their central servers and allowing your app to download the public keys of your contacts automatically. The problem here is that the WhatsApp server could potentially lie about the public keys. Instead of giving you your friend’s key, it could give you a public key belonging to a third party, such as the government. That’s why, if you don’t trust WhatsApp, you would need to verify what they call the “security” code with your friends. This way you would be able to make sure the WhatsApp server really did give you your friend’s key. Things get more complicated when you look at what happens if your friend changes his public key, for example, because he gets a new phone or reinstalls WhatsApp. Here the WhatsApp server gives you new public keys for your contacts.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

5 Reasons Why you Need Multifactor Authentication for Online Security in the Virtual World

5 Reasons Why you Need Multifactor Authentication for Online Security in the Virtual World | digitalcuration | Scoop.it
Multifactor Authentication is a complete defense solution to secure your online resources. It combines questions, one time password and biometrics.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Launching our new Chrome extension NewsCheck - First Draft News

Launching our new Chrome extension NewsCheck - First Draft News | digitalcuration | Scoop.it
NewsCheck is a Chrome Extension that prompts you to work through a verification checklist and allows others to see how you authenticated an image or video We designed two guides: one for verifying photos and one for videos. We launched it as a print product at the Online News Association in September 2015, and while we received positive feedback, it was difficult to watch people trying to navigate the different steps on a folded piece of paper. It was certainly not user friendly. And considering we’d created the Visual Verification Guides to make people’s lives easier, it was obvious we needed to do more.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

TDAHapp.com : une application Web pour faciliter le suivi des élèves

TDAHapp.com : une application Web pour faciliter le suivi des élèves | digitalcuration | Scoop.it
TDAHapp.com permet notamment aux intervenants de rassembler en ligne les informations essentielles pour chaque élève suivi.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Brazilian Government Tweets Passwords to All of Its Social Media Accounts

Brazilian Government Tweets Passwords to All of Its Social Media Accounts | digitalcuration | Scoop.it
Brazilian President Michel Temer’ administration became the laughing stock of the country’s Internet users after the passwords for its social media accounts were accidentally leaked to the public.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Ways to Explore Personal Data After Someone Dies

Ways to Explore Personal Data After Someone Dies | digitalcuration | Scoop.it
Bill Coberly is a writer whose Father recently died unexpectedly.  He describes some of the issues which arise when a family member has an unplanned death in a recent article he wrote. He discusses many issues encountered after his death but discovers something that puzzles him with regards to preservation. What should he do with all the video game save files on his computer. His Dad was a pretty avid gamer and Bill discovered the data generated by all the games he played on his computer. Among the data was the history of 4,638 hours of play time in Civilization IV.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Security questions for beginners

Security questions for beginners | digitalcuration | Scoop.it
Security questions for beginners We want Tinfoil to be welcoming to anyone with questions about digital security. Recognizing that security can often include foreign-sounding language and concepts, this thread is for he…
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Crypto : le webdoc'

Crypto : le webdoc' | digitalcuration | Scoop.it
L’ANSSI propose un nouveau web-documentaire consacré à la cryptologie. Un format innovant qui présente de manière simple et interactive quelques-unes des nombreuses facettes de la cryptologie.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Comment la Social Room de SNCF change la nature des conversations

Comment la Social Room de SNCF change la nature des conversations | digitalcuration | Scoop.it
En octobre, SNCF a surpris lançant une ''Social Room’' d'ampleur : 12 personnes réagissant 7 jours sur 7 aux 60 000 sollicitations mensuelles que la marque reçoit sur les médias sociaux. Quelles sont les clés de succès de ce projet ? La Social Room est-elle en train de transformer l’entreprise ? Pour y répondre, nous donnons la parole à Béatrice Chavanel, directrice de la marque et de la communication externe.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Quelle place pour les salariés de la banque à l’ère de l’intelligence artificielle ?

Quelle place pour les salariés de la banque à l’ère de l’intelligence artificielle ? | digitalcuration | Scoop.it
Les progrès rapides de l'informatique cognitive remettent déjà en question les activités routinières et répétitives. Et « des tâches cognitives qui étaient considérées comme non automatisables récemment encore sont désormais à risque », souligne une étude de l'OCDE sur l'avenir du travai
more...
No comment yet.